• DOJ, NIST team up to shore up forensic science, but skeptics question effort

    Five years ago, a report on the state of forensic science by the National Academy of Sciences decried the lack of sound science in the analysis of evidence in criminal cases across the country. It spurred a flurry of outrage and promises, but no immediate action. Now, renewed efforts are underway, with the Department of Justice (DOJ) and the National Institute of Standards & Technology (NIST) teaming up to create a National Commission on Forensic Science.

  • Wisconsin silent about cell phone tracking by state police

    The Wisconsin Department of Justice(DOJ) is refusing to acknowledge that it has deployed Stingray technology to track Wisconsin residents’ cellphones, despite reports claiming the state has used the technology during previous investigations. The state also denied a public records request made in April seeking details on how often Stingray technology is used, how data is stored and shared, and how often warrants are obtained.

  • Virginia lawmakers mull limiting police use of license plate readers

    Some Virginia lawmakers are planning to propose legislation which will limit the police use of license plate readers (LPRs). The state currently has no laws restricting how police collect or store license plate data gathered by LPRs. Last year, then-Attorney General Ken Cuccinelli said he believed Virginia State Police should be restricted from capturing and storing license plate data outside of a specific, ongoing criminal investigation, but for now, police departments across the state have adopted their own measures.

  • Criminals cannot hide behind prepaid phones

    Cambria County, Pennsylvania police quickly tracked the individual who called to say he had placed a bomb in the county courthouse. The individual called the court to warn of the bomb and allow for an orderly evacuation. The call was a hoax, but the the authorities began to evacuate the building. Even before the court was completely evacuated, the 911 dispatch center, Ebensburg Borough Police Department, and Cambria County Sheriff’s Department all knew that the call came from a prepaid phone purchased at the Richland Township Wal-Mart. With the prompt help of Verizon and Wal-Mart, the suspect was nabbed.

  • Public safety officials implement Boston bombing's lessons

    The use of improvised tourniquets to stop bleeding was considered not only old-fashioned, but potentially damaging. Yet, in the minutes following the Boston marathon bombing, people near the finish line used improvised tourniquets to stop the bleeding of dozens of those injured around them while waiting for medical crews to arrive. Security and public safety officials have used lessons learned from the 2013 Boston Marathon bombing to prepare for this year’s event, including providing police officers with tourniquets. Organizers of large public events are implementing other lessons from the 2013 attack.

  • Adoption of battlefield surveillance system in urban settings raises privacy concerns

    More cities are adopting an aerial surveillance system first developed for the military. The surveillance cameras, fitted on a small plane, can record a 25-square-mile area for up to six hours, and cost less than the price of a police helicopter. The system also has the capability of watching 10,000 times the area that a police helicopter could watch. Privacy advocates are concerned. “There are an infinite number of surveillance technologies that would help solve crimes, but there are reasons that we don’t do those things, or shouldn’t be doing those things,” said one of them.

  • NYPD shuts down controversial Muslim surveillance program

    The New York Police Department has shut down its “Demographics Unit,” known for secretly infiltrating Muslim communities in New York and New Jersey with informers. The Muslim surveillance program, initiated under former NYPD commissioner, Raymond Kelly, is the subject of two federal lawsuits and has faced growing criticism from civil rights groups. NYPD acknowledged that in its 10-year existence, the surveillance program has not generated even a single lead.

  • Tiny particles could help verify goods

    Chemical engineers hope smartphone-readable microparticles could crack down on counterfeiting. Some 2 to 5 percent of all international trade involves counterfeit goods, according to a 2013 United Nations report. These illicit products — which include electronics, automotive and aircraft parts, pharmaceuticals, and food — can pose safety risks and cost governments and private companies hundreds of billions of dollars annually. Researchers have invented a new type of tiny, smartphone-readable particle that they believe could be deployed to help authenticate currency, electronic parts, and luxury goods, among other products. The particles, which are invisible to the naked eye, contain colored stripes of nanocrystals that glow brightly when lit up with near-infrared light.

  • Real-life CSI: The stories gunshot residue tell

    The popular TV series “CSI” is fiction, but every day, real-life investigators and forensic scientists collect and analyze evidence to determine what happened at crime scenes. In a new study, scientists say they have developed a more rapid and accurate method that could allow crime scene investigators to tell what kind of ammunition was shot from a gun based on the residue it left behind.

  • New tool makes scanning the Internet for illegal images possible

    Researchers have developed a system that makes it possible to scan traffic on the Internet for illegal photographs. The system can, for example, help trace child pornography on the Internet without infringing on the privacy of Internet users. Internet service providers could use the tool to keep their network “clean.”

  • Kenyan security forces hobbled by lack of funds

    Kenya may be facing a heightened risk from regional terrorism, but security forces in Kenya are hobbled by glaring underfunding due to government corruption and mismanagement. The Anti-Terror Police Unit in Nairobi, the main force set up to combat terrorist acts, has only $2,205 for its operations during the first quarter of the year — coming to just $735 for March. In comparison, an average parliamentary salary is around $45,000 for the same period.

  • NIST report on iris aging flawed: researchers

    In July last year, NIST released a report, titled “IREX VI: Temporal Stability of Iris Recognition Accuracy,” which concluded that its “best estimate of iris recognition aging” is so small that there should be no concern about the possibility of iris recognition accuracy degrading over time. University of Notre Dame biometrics researchers Kevin Bowyer and Estefan Ortiz have release a paper which points to errors in the NIST report on how iris aging affects the accuracy of iris recognition. They describe specific methodological errors in the NIST report, and present a list of suggestions to be addressed in a revised version of the report.

  • DHS drops plans for national license-plate database

    DHS has recalled its solicitation for bids by private companies to help the department create a national license-plate database which would allow unlimited access to information obtained from commercial and law enforcement license plate readers (LPRs). DHS wanted to use the database to track fugitive undocumented immigrants and others sought by law enforcement, but the database, which could have contained more than one billion records, raised privacy concerns and questions about the safeguards which would be used to protect innocent citizens.

  • How dogs detect explosives: New training recommendations

    Researchers have helped determine the science behind how canines locate explosives such as Composition C-4 (a plastic explosive used by the U.S. military). The study found the dogs react best to the actual explosive, calling into question the use of products designed to mimic the odor of C-4 for training purposes.

  • Identifying, thwarting insider threats before they do damage

    Researchers argue that one way to identify and predict potential insider threats even before these individuals begin to do damage like stealing and leaking sensitive information, is by using Big Data to monitor changes in behavior patterns. Researchers at PARC, for example, found that individuals who exhibit sudden decrease in participation in group activity, whether in a game like World of Warcraft or corporate e-mail communications, are likely to withdraw from the organization. A withdrawal represents dissatisfaction with the organization, a common trait of individuals who are likely to engage in insider security breaches.